全文获取类型
收费全文 | 4379篇 |
免费 | 199篇 |
国内免费 | 12篇 |
专业分类
电工技术 | 99篇 |
综合类 | 26篇 |
化学工业 | 699篇 |
金属工艺 | 87篇 |
机械仪表 | 111篇 |
建筑科学 | 191篇 |
矿业工程 | 10篇 |
能源动力 | 180篇 |
轻工业 | 401篇 |
水利工程 | 34篇 |
石油天然气 | 17篇 |
武器工业 | 1篇 |
无线电 | 735篇 |
一般工业技术 | 810篇 |
冶金工业 | 481篇 |
原子能技术 | 43篇 |
自动化技术 | 665篇 |
出版年
2023年 | 32篇 |
2022年 | 58篇 |
2021年 | 83篇 |
2020年 | 67篇 |
2019年 | 71篇 |
2018年 | 109篇 |
2017年 | 133篇 |
2016年 | 123篇 |
2015年 | 108篇 |
2014年 | 172篇 |
2013年 | 313篇 |
2012年 | 238篇 |
2011年 | 260篇 |
2010年 | 201篇 |
2009年 | 208篇 |
2008年 | 215篇 |
2007年 | 186篇 |
2006年 | 184篇 |
2005年 | 130篇 |
2004年 | 133篇 |
2003年 | 113篇 |
2002年 | 111篇 |
2001年 | 79篇 |
2000年 | 80篇 |
1999年 | 96篇 |
1998年 | 203篇 |
1997年 | 140篇 |
1996年 | 85篇 |
1995年 | 76篇 |
1994年 | 65篇 |
1993年 | 81篇 |
1992年 | 47篇 |
1991年 | 27篇 |
1990年 | 34篇 |
1989年 | 22篇 |
1988年 | 21篇 |
1987年 | 20篇 |
1986年 | 12篇 |
1985年 | 15篇 |
1984年 | 20篇 |
1983年 | 15篇 |
1982年 | 13篇 |
1981年 | 21篇 |
1980年 | 15篇 |
1979年 | 12篇 |
1977年 | 19篇 |
1976年 | 19篇 |
1975年 | 17篇 |
1974年 | 12篇 |
1973年 | 10篇 |
排序方式: 共有4590条查询结果,搜索用时 15 毫秒
101.
H. Böcük B. A. Albiss İ Ercan H. Özkan N. Gasanly 《Journal of Low Temperature Physics》1996,105(3-4):975-980
Voltage-current characteristics of YBCO superconductor was studied under magnetic field up to 0.4 T at different temperatures below Tc. The critical temperature decreases and the transition width broadens under magnetic field. V-I data below Tc were fitted to a power law expression V I(T,B) in which (T,B) is found to decrease with increase of magnetic field and temperature, gradually approaching unity as T approaches Tc, being independent of magnetic field. Similarly, (T,B) approaches unity as magnetic field increases being independent of temperature. 相似文献
102.
Consider a rooted tree T of arbitrary maximum degree d representing a collection of n web pages connected via a set of links, all reachable from a source home page represented by the root of T. Each web page i carries a probability p
i
representative of the frequency with which it is visited. By adding hotlinks—shortcuts from a node to one of its descendents—we
wish to minimize the expected number of steps l needed to visit pages from the home page, expressed as a function of the entropy H(p) of the access probabilities p. This paper introduces several new strategies for effectively assigning hotlinks in a tree. For assigning exactly one hotlink
per node, our method guarantees an upper bound on l of 1.141H(p)+1 if d>2 and 1.08H(p)+2/3 if d=2. We also present the first efficient general methods for assigning at most k hotlinks per node in trees of arbitrary maximum degree, achieving bounds on l of at most
\frac2H(p)log(k+1)+1\frac{2H(p)}{\log(k+1)}+1
and
\fracH(p)log(k+d)-logd+1\frac{H(p)}{\log(k+d)-\log d}+1
, respectively. All our methods are strong, i.e., they provide the same guarantees on all subtrees after the assignment. We also present an algorithm implementing these
methods in O(nlog n) time, an improvement over the previous O(n
2) time algorithms. Finally we prove a Ω(nlog n) lower bound on the running time of any strong method that guarantee an average access time strictly better than 2H(p). 相似文献
103.
Arnaud Fréville Saïd Hanafi Frédéric Semet Nicolas Yanev 《Computers & Operations Research》2010,37(10):1688-1696
This article proposes a tabu search approach to solve a mathematical programming formulation of the linear classification problem, which consists of determining an hyperplane that separates two groups of points as well as possible in ?m. The tabu search approach proposed is based on a non-standard formulation using linear system infeasibility. The search space is the set of bases defined on the matrix that describes the linear system. The moves are performed by pivoting on a specified row and column. On real machine learning databases, our approach compares favorably with implementations based on parametric programming and irreducible infeasible constraint sets. Additional computational results for randomly generated instances confirm that our method provides a suitable alternative to the mixed integer programming formulation that is solved by a commercial code when the number of attributes m increases. 相似文献
104.
İbrahim Büyükyazıcı 《Computers & Mathematics with Applications》2010,59(1):274-282
In this paper, we investigate convergence and approximation properties of a Chlodowsky type generalization of Stancu polynomials (we called Stancu–Chlodowsky polynomials).The rates of convergence of this generalization are obtained by means of modulus of continuity and by using the -functional of Peetre. We also present and prove theorems on weighted approximation and the order of approximation of continuous functions by these operators on all positive semi-axis. 相似文献
105.
In this paper, an inspection strategy is proposed for systems subject to random shocks and whose state is only known through
inspection. The shocks magnitudes and times between shocks arrivals are random variables. Each shock induces an amount of
damage to the system which is gradually weakened as damage accumulates. The system fails when the total damage exceeds some
threshold level. The proposed inspection strategy suggests to inspect the system at predetermined times T1, T2,...T
k
. If failure is detected, then the system is repaired to a state as good as new, otherwise, it is kept operating. The expression
of the system availability is derived. A numerical procedure is developed to generate an inspection sequence which maximizes
the system availability. The proposed strategy has been developed for some critical subsystems of trees harvesters. An illustrative
example is provided. 相似文献
106.
Multiobjective evolutionary clustering of Web user sessions: a case study in Web page recommendation
G. Nildem Demir A. Şima Uyar Şule Gündüz-Öğüdücü 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2010,14(6):579-597
In this study, we experiment with several multiobjective evolutionary algorithms to determine a suitable approach for clustering
Web user sessions, which consist of sequences of Web pages visited by the users. Our experimental results show that the multiobjective
evolutionary algorithm-based approaches are successful for sequence clustering. We look at a commonly used cluster validity
index to verify our findings. The results for this index indicate that the clustering solutions are of high quality. As a
case study, the obtained clusters are then used in a Web recommender system for representing usage patterns. As a result of
the experiments, we see that these approaches can successfully be applied for generating clustering solutions that lead to
a high recommendation accuracy in the recommender model we used in this paper. 相似文献
107.
This paper proposes two maintenance schemes for reused products. In order to reduce the purchasing cost or conform to the concept of environmental protection, reuse is considered as one of the most efficient strategies. However, the initial quality of reused product is often inferior to the new one and then product failures will occur frequently during usage period. Therefore, two periodical preventive maintenance (PM) policies in this paper are developed to decrease the high failure rate of the second-hand products. When a second-hand product with Weibull life time distribution of known age is intended to be used for a pre-specified period of time, the optimal number of PM actions and the corresponding maintenance degree are derived such that the expected total maintenance cost is minimized. The impact of providing preventive maintenance is illustrated through numerical examples. 相似文献
108.
Lo JT 《Neural computation》2011,23(10):2626-2682
A biologically plausible low-order model (LOM) of biological neural networks is proposed. LOM is a recurrent hierarchical network of models of dendritic nodes and trees; spiking and nonspiking neurons; unsupervised, supervised covariance and accumulative learning mechanisms; feedback connections; and a scheme for maximal generalization. These component models are motivated and necessitated by making LOM learn and retrieve easily without differentiation, optimization, or iteration, and cluster, detect, and recognize multiple and hierarchical corrupted, distorted, and occluded temporal and spatial patterns. Four models of dendritic nodes are given that are all described as a hyperbolic polynomial that acts like an exclusive-OR logic gate when the model dendritic nodes input two binary digits. A model dendritic encoder that is a network of model dendritic nodes encodes its inputs such that the resultant codes have an orthogonality property. Such codes are stored in synapses by unsupervised covariance learning, supervised covariance learning, or unsupervised accumulative learning, depending on the type of postsynaptic neuron. A masking matrix for a dendritic tree, whose upper part comprises model dendritic encoders, enables maximal generalization on corrupted, distorted, and occluded data. It is a mathematical organization and idealization of dendritic trees with overlapped and nested input vectors. A model nonspiking neuron transmits inhibitory graded signals to modulate its neighboring model spiking neurons. Model spiking neurons evaluate the subjective probability distribution (SPD) of the labels of the inputs to model dendritic encoders and generate spike trains with such SPDs as firing rates. Feedback connections from the same or higher layers with different numbers of unit-delay devices reflect different signal traveling times, enabling LOM to fully utilize temporally and spatially associated information. Biological plausibility of the component models is discussed. Numerical examples are given to demonstrate how LOM operates in retrieving, generalizing, and unsupervised and supervised learning. 相似文献
109.
This paper targets at the problem of automatic semantic indexing of news videos by presenting a video annotation and retrieval system which is able to perform automatic semantic annotation of news video archives and provide access to the archives via these annotations. The presented system relies on the video texts as the information source and exploits several information extraction techniques on these texts to arrive at representative semantic information regarding the underlying videos. These techniques include named entity recognition, person entity extraction, coreference resolution, and semantic event extraction. Apart from the information extraction components, the proposed system also encompasses modules for news story segmentation, text extraction, and video retrieval along with a news video database to make it a full-fledged system to be employed in practical settings. The proposed system is a generic one employing a wide range of techniques to automate the semantic video indexing process and to bridge the semantic gap between what can be automatically extracted from videos and what people perceive as the video semantics. Based on the proposed system, a novel automatic semantic annotation and retrieval system is built for Turkish and evaluated on a broadcast news video collection, providing evidence for its feasibility and convenience for news videos with a satisfactory overall performance. 相似文献
110.
Wirtschaftsinformatik zwischen Wissenschaft und Unternehmertum 总被引:1,自引:1,他引:0
One of the major success indicators for applied research sciences is the rate of transfer from research into practice. Only if concrete and economically successful products are derived from research results, such sciences can induce an impact. However, this process of innovation mandatorily needs entrepreneurship. Within the domain of business information systems, the two German enterprises SAP AG and IDS Scheer AG demonstrate that linking research and innovation is the key to lasting success in the information technology markets. German industry has significant disadvantages on the cost of human resources. Therefore it can be only successful with products that incorporate a high degree of innovation and that are consequently highly priced. But the invention of such products needs scientific research as a source of inspiration. Germany has a highly developed infrastructure of research facilities and organizations. However, they need to be better coordinated and aligned with business needs. Vice versa, enterprises need to actively approach the scientific community in order to clearly formulate their demand. Such a strategy needs changes on all sides. To achieve a change in the domain of science, it is necessary to change the profile of leading researchers, such as full professors. They should incorporate attributes of an entrepreneur and be profiled more as a research manager that tries to anticipate future needs and to develop its unit in terms of research subjects as well as personnel and financial resources. Consequently, the process of application, selection and review of leading researchers should be more oriented on processes that are common in enterprises. E. g. external head-hunters can be involved in the searching and assessing process in order to get the best qualified person for the research vacancy. Also enterprises need to change their attitude towards scientific research. In order to foster this process, executives could be invited to advisory and supervisory boards of research organisations. Furthermore, those executives must be proactively informed about the research activities and results in order to attract their interest and to show potentials for a transfer into products. There is still a long way in the hunt for innovation leadership and all these suggestions can only be a starting point. 相似文献